Skip to main content

CVE-2022-37347: OOB Read Information Disclosure in Trend Micro Trend Micro Security (Consumer)

Medium
VulnerabilityCVE-2022-37347cvecve-2022-37347
Published: Mon Sep 19 2022 (09/19/2022, 18:00:58 UTC)
Source: CVE Database V5
Vendor/Project: Trend Micro
Product: Trend Micro Security (Consumer)

Description

Trend Micro Security 2021 and 2022 (Consumer) is vulnerable to an Out-Of-Bounds Read Information Disclosure Vulnerability that could allow an attacker to read sensitive information from other memory locations and cause a crash on an affected machine. This vulnerability is similar to, but not the same as CVE-2022-35234.

AI-Powered Analysis

AILast updated: 07/07/2025, 22:56:34 UTC

Technical Analysis

CVE-2022-37347 is a medium-severity vulnerability affecting Trend Micro Security (Consumer) versions 2022 (specifically version 17.7.1383 and below). The vulnerability is classified as an Out-Of-Bounds (OOB) Read information disclosure issue (CWE-125). This flaw allows an attacker with limited privileges (local access with low privileges) to read sensitive information from memory locations outside the intended buffer boundaries. The vulnerability does not require user interaction and does not impact integrity or availability directly, but it compromises confidentiality by potentially exposing sensitive data stored in memory. The attack vector is local (AV:L), meaning the attacker must have some level of access to the affected machine. The vulnerability is similar in nature to CVE-2022-35234 but is distinct. Exploitation could also cause the affected application or system to crash, leading to a denial of service scenario, although availability impact is rated as none in the CVSS vector. No known exploits are currently reported in the wild, and no official patches have been linked in the provided information, indicating that remediation may require vendor updates or workarounds. The vulnerability is relevant to consumer versions of Trend Micro Security, a widely used antivirus and endpoint protection product, which means that affected systems could include personal and home office computers running this software. Given the nature of the vulnerability, an attacker with local access could leverage this flaw to extract sensitive information from memory, potentially including credentials or other confidential data, which could be used for further attacks or privilege escalation.

Potential Impact

For European organizations, the impact of CVE-2022-37347 depends largely on the deployment of Trend Micro Security (Consumer) products within their environment, particularly on endpoints used by employees or contractors. Although this vulnerability requires local access and low privileges, it could be exploited by insiders or through compromised user accounts to extract sensitive information from memory, potentially exposing credentials, tokens, or other confidential data. This could facilitate lateral movement within networks or escalation of privileges. The lack of requirement for user interaction increases the risk in environments where attackers have gained initial footholds. While the vulnerability does not directly affect availability or integrity, the potential confidentiality breach could undermine trust in endpoint security solutions and lead to data leakage incidents. European organizations with remote or hybrid workforces using consumer-grade security products may be particularly exposed if these products are not updated. Additionally, sectors with high data sensitivity such as finance, healthcare, and government could face increased risks if attackers leverage this vulnerability to access sensitive information. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Therefore, European organizations should consider this vulnerability in their endpoint security risk assessments and patch management strategies.

Mitigation Recommendations

1. Immediate mitigation should focus on upgrading Trend Micro Security (Consumer) to the latest available version beyond 17.7.1383, as vendors typically release patches for such vulnerabilities. If no patch is available, organizations should monitor vendor advisories closely for updates. 2. Restrict local access to endpoints running the affected software by enforcing strict access controls, limiting administrative privileges, and using endpoint management tools to monitor and control user activities. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior that could indicate exploitation attempts. 4. Conduct regular memory scanning and forensic analysis on critical endpoints to detect potential information leakage or crashes related to this vulnerability. 5. Educate users about the risks of local privilege escalation and enforce strong authentication mechanisms to reduce the likelihood of unauthorized local access. 6. In environments where consumer-grade security products are used, consider migrating to enterprise-grade endpoint protection solutions that may have more robust security controls and faster patch cycles. 7. Implement network segmentation to limit the impact of any compromise resulting from this vulnerability, preventing lateral movement. 8. Maintain up-to-date backups and incident response plans to quickly recover from any potential exploitation that leads to system instability or data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
trendmicro
Date Reserved
2022-08-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6838a78c182aa0cae2890f61

Added to database: 5/29/2025, 6:29:32 PM

Last enriched: 7/7/2025, 10:56:34 PM

Last updated: 9/23/2025, 9:20:40 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats